Search Results - (( _ application system algorithm ) OR ( some application rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  3. 3

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  6. 6

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…They have a wide range of application in which the goal is to decrease the probability of the system hazardous behavior. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…The thesis describes the step by step the method to find an algorithm by using experimental data. Vapor compression refrigeration system was studied as it is the most widely used refrigeration system especially in small scale of refrigeration application such as in domestic application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17

    Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system by Nasir, Ahmad Nor Kasruddin, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Muhammad Hamka, Embong

    Published 2019
    “…The developed algorithms have been applied to optimize Proportional Integral Derivative (PID) controller parameters for a flexible manipulator system and an inverted pendulum system. …”
    Get full text
    Get full text
    Research Report
  18. 18
  19. 19

    A Study On The Application Of Gravitational Search Algorithm In Optimizing Stereo Matching Algorithm’s Parameters For Star Fruit Inspection System by Zainal Abidin, Amar Faiz, Mohd Ali, Nursabillilah, Mat Zain, Norlina, Abdul Majid, Masmaria, Rifin, Rozi, Kadiran, Kamaru Adzha, Mohd Mokji, Ahmad Musa, Tan, Kok, Amirulah, Rahman

    Published 2018
    “…This paper reports the result obtained by implementing Gravitational Search Algorithm for tuning Stereo Matching Algorithm’s parameters for the application star fruit inspection system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Orthogonal least square algorithm and its application for modelling suspension system by Ahmad, Robiah, Jamaluddin, Hishamuddin

    Published 2001
    “…The derivation of the algorithm is presented and its application to the modelling of a car suspension system is included to demonstrate the effectiveness of the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article